Architectural Principles for Orchestration of CrossOrganizational Service Delivery: Case Studies from the Netherlands, Practical Studies in E-Government: Best Practices from Around the World, pp.167-185, 2011. ,
Theorizing information security success: Towards secure eGovernment, International Journal of Electronic Government Research, vol.6, issue.3, pp.31-41, 2010. ,
DOI : 10.4018/jegr.2010070103
Trustworthiness in electronic commerce: the role of privacy, security, and site attributes, Journal of Strategic Information Systems, vol.11, pp.245-270, 2002. ,
, Information privacy concerns and e-government: a research agenda. Transforming Government: People, Process and Policy, vol.4, pp.10-13, 2010.
DOI : 10.1108/17506161011028777
Enforcing Privacy in Interoperable E-Government Applications, Proceedings of the 2002 annual conference on Digital government research (dg.o), 2002. ,
Evaluating procedural alternatives: A case study in e-voting, Electronic Government, vol.6, issue.2, pp.213-231, 2009. ,
Building Secure Elections: E-Voting, Security and Systems Theory, Public Administration Review, vol.64, issue.5, pp.515-528, 2004. ,
DOI : 10.1111/j.1540-6210.2004.00400.x
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.618.9318
Designing A New Electronic Voting System: Towards electronic voting systems, 2010. ,
Securing e-voting as a legitimate option for e-governance, Electronic Government, vol.4, issue.3, pp.269-289, 2007. ,
DOI : 10.1504/eg.2007.014162
Opportunities and threats: A security assessment of state egovernment websites, Government Information Quarterly, vol.27, pp.49-56, 2010. ,
An Analysis of the Security Patterns Landscape, Proceedings of the Third International Workshop on Software Engineering for Secure Systems (SESS '07), 2007. ,
Linking patterns and non-functional requirements, Proceedings of the ninth Conference on Pattern Language of Programs (PLoP, 2003. ,
User group structures in object-oriented database authorization, Proceedings of the IFIP WG11.3 Working Conference on Database Security VII, pp.57-76, 1994. ,
A pattern language for key management, Proceedings of the eight Conference on Pattern Language of Programs (PLoP, 2002. ,
Pattern-Oriented Software Architecture, Patterns for Concurrent and Networked Hoboken, vol.2, 2000. ,
Security Engineering with Patterns: Origins, Theoretical Models, and New Applications, 2003. ,
Data lter architecture pattern, Proceedings of the fifth Conference on Pattern Language of Programs (PLoP, 1999. ,
Architectural patterns for enabling application security, 1997. ,
Tropyc: A pattern language for cryptographic objectoriented software, Pattern Languages of Program Design, vol.4, 1998. ,
A pattern language for security models, Proceedings of the seventh Conference on Pattern Languages of Programs (PloP), 2001. ,
An analysis of the security patterns landscape, Proceedings of the Third International Workshop on Software Engineering for Secure Systems (SESS '07), 2007. ,
Access controls by object-oriented concepts, Proceedings of the IFIP TC11WG11.3, Eleventh International Conference on Database Security XI: Status and Prospects, pp.325-340, 1998. ,
More patterns for operating systems access control, Proceedings of the eight European Conference on Patterns Language of Programming, 2003. ,
Aplrac: A pattern language for designing and implementing role-based access control, Proceedings of the sixth European Conference on Pattern Languages of Programs, 2001. ,
Role-based access control on the web using java, Proceedings of the fourth ACM workshop on Role-based access control, RBAC '99, 1999. ,
DOI : 10.1145/319171.319173
, Security Patterns: Integrating Security and Systems Engineering, 2006.